Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 51

Full-Text Articles in Social and Behavioral Sciences

2017 Florida Data Science For Social Good (Fl-Dssg) Annual Report, F. Dan Richard, Karthikeyan Umapathy Jan 2018

2017 Florida Data Science For Social Good (Fl-Dssg) Annual Report, F. Dan Richard, Karthikeyan Umapathy

Karthikeyan Umapathy

The Florida Data Science for Social Good (FL-DSSG) Program is a summer internship program that matches data science expertise with real-world problems. The FL-DSSG program works with community organizations who are trying to affect change in their communities and who have data management, analysis, and data visualization projects that have the potential to shift understanding around a community issue, influence planning, revise practices, or see efforts in supporting community initiatives more focused or renewed. The mission of the FL-DSSG is to promote data-informed approaches and partners and the partners who use these approaches solve wicked social problems while creating educational …


Expectations Of Job Responsibilities Of Recreation And Sports Managers, Jennifer Y. Mak Apr 2016

Expectations Of Job Responsibilities Of Recreation And Sports Managers, Jennifer Y. Mak

Jennifer Y Mak

The purpose of this study was to identify whether there were differences in the expectations of job responsibilities between different levels of recreation and sports managers towards the same post. The problem was divided into two sub-problems: (l) to determine the relationship in the perceived importance of entry-level managers' job responsibilities between entry-level managers and middle-level managers; and (2) to determine the relationship in the perceived importance of middle-level managers job responsibilities between middle-level managers and top-level managers. Several items were found to have significant difference in the perceptions among the subjects.


Expectations Of Job Responsibilities Of Recreation And Sports Managers, Jennifer Y. Mak Apr 2016

Expectations Of Job Responsibilities Of Recreation And Sports Managers, Jennifer Y. Mak

Jennifer Y Mak

The purpose of this study was to identify whether there were differences in the expectations of job responsibilities between different levels of recreation and sports managers towards the same post. The problem was divided into two sub-problems: (l) to determine the relationship in the perceived importance of entry-level managers' job responsibilities between entry-level managers and middle-level managers; and (2) to determine the relationship in the perceived importance of middle-level managers job responsibilities between middle-level managers and top-level managers. Several items were found to have significant difference in the perceptions among the subjects.


Glis 649 W2016 Presentation On Metadata, Eun Park Dec 2015

Glis 649 W2016 Presentation On Metadata, Eun Park

Group 6 649

Class lecture/presentation on Metadata


Paradoxical Truths In Heroic Leadership: Implications For Leadership Development And Effectiveness, Scott T. Allison, Jennifer L. Cecilione Dec 2015

Paradoxical Truths In Heroic Leadership: Implications For Leadership Development And Effectiveness, Scott T. Allison, Jennifer L. Cecilione

Scott T. Allison

In this chapter, we discuss the basic elements of heroic leadership, showing how heroism and exemplary leadership are deeply intertwined. We then describe six paradoxical truths about heroic leadership that are often unrecognized and unappreciated. We believe that ignorance of these counterintuitive truths and paradoxes about heroic leadership can lead to misunderstandings about leaders, leadership, and leadership development. Most of these paradoxes are a central part of the hero’s journey as described by comparative mythologist Joseph Campbell (1949). We will discuss the genesis of these paradoxical truths, and we will suggest ways that an awareness of these principles can engender …


Communication And Effectiveness In A Us Nursing Home Quality-Improvement Collaborative, Priscilla Arling, Kathleen Abrahamson, Edward J. Miech, Thomas S. Inui, Greg Arling Jun 2015

Communication And Effectiveness In A Us Nursing Home Quality-Improvement Collaborative, Priscilla Arling, Kathleen Abrahamson, Edward J. Miech, Thomas S. Inui, Greg Arling

Priscilla Arling

In this study, we explored the relationship between changes in resident health outcomes, practitioner communication patterns, and practitioner perceptions of group effectiveness within a quality-improvement collaborative of nursing home clinicians. Survey and interview data were collected from nursing home clinicians participating in a quality-improvement collaborative. Quality-improvement outcomes were evaluated using US Federal and State minimum dataset measures. Models were specified evaluating the relationships between resident outcomes, staff perceptions of communication patterns, and staff perceptions of collaborative effectiveness. Interview data provided deeper understanding of the quantitative findings. Reductions in fall rates were highest in facilities where respondents experienced the highest levels …


Knowledge Sharing And Knowledge Management System Avoidance: The Role Of Knowledge Type And The Social Network In Bypassing An Organizational Knowledge Management System, Susan A. Brown, Alan R. Dennis, Diana Burley, Priscilla Arling Jun 2015

Knowledge Sharing And Knowledge Management System Avoidance: The Role Of Knowledge Type And The Social Network In Bypassing An Organizational Knowledge Management System, Susan A. Brown, Alan R. Dennis, Diana Burley, Priscilla Arling

Priscilla Arling

Knowledge sharing is a difficult task for most organizations, and there are many reasons for this. In this article, we propose that the nature of the knowledge shared and an individual's social network influence employees to find more value in person-to-person knowledge sharing, which could lead them to bypass the codified knowledge provided by a knowledge management system (KMS). We surveyed employees of a workman's compensation board in Canada and used social network analysis and hierarchical linear modeling to analyze the data. The results show that knowledge complexity and knowledge teachability increased the likelihood of finding value in person-to-person knowledge …


A Lexical Approach To Classifying Computer Games, Xiaowen Fang, Susy S. Chan, Chitra Nair Apr 2015

A Lexical Approach To Classifying Computer Games, Xiaowen Fang, Susy S. Chan, Chitra Nair

Xiaowen Fang

According to the Entertainment Software Association (2009), more than two-thirds of all American households play computer games. This vast audience is fueling the growth of the multi-billion dollar computer game industry and bringing jobs to communities across the nation. The rising popularity and proliferation of computer games call for systematic research on the design of computer games and their impact on game players. Systematic research on computer games inevitably requires an accurate description of the traits or characteristics of games. However, the traits of computer games haven’t been well studied. Currently, computer games are often classified into genres by the …


It Project Managers' Perceptions And Use Of Virtual Team Technologies, Catherine Beise, Fred Niederman, Herbert Mattord May 2014

It Project Managers' Perceptions And Use Of Virtual Team Technologies, Catherine Beise, Fred Niederman, Herbert Mattord

Herbert J. Mattord

This paper presents the results of a case study pertaining to the use of information and communication media to support a range of project management tasks. A variety of electronic communication tools have evolved to support collaborative work and virtual teams. Few of these tools have focused specifically on the needs of project managers. In an effort to learn how practicing IT project managers employ these tools, data were collected at a North American Fortune 500 industrial company via interviews with IT project managers regarding their use and perceptions of electronic media within the context of their work on project …


From Cyber Terrorism To State Actors’ Covert Cyber Operations, Jan Kallberg, Bhavani Thuraisingham Mar 2013

From Cyber Terrorism To State Actors’ Covert Cyber Operations, Jan Kallberg, Bhavani Thuraisingham

Jan Kallberg

Historically, since the Internet started to become a common feature in our lives, hackers have been seen as a major threat. This view has repeatedly been entrenched and distributed by media coverage and commentaries through the years. Instead the first twenty year of the Internet was acceptably secure, due to the limited abilities of the attackers, compared to the threat generated from a militarized Internet with state actors conducting cyber operations. In reality, the Internet have a reversed trajectory for its security where it has become more unsafe over time and moved from a threat to the individual to a …


Nuclear Deterrence In A Second Obama Term, Adam Lowther, Jan Kallberg Mar 2013

Nuclear Deterrence In A Second Obama Term, Adam Lowther, Jan Kallberg

Jan Kallberg

In the months prior to the 2012 presidential election in the United States, members of the Obama administration and sympathetic organizations inside the Beltway began floating the idea that the administration would pursue – after an Obama victory – further reductions in the US nuclear arsenal. With the ink still wet on the New ST ART Treaty, efforts to reduce the American arsenal to 1000 operationally deployed strategic nuclear weapons or, as some suggest, 500, is certainly premature. These efforts illustrate a poor understanding of nuclear deterrence theory and practice and the ramifications of a United States that lacks a …


Offensive Cyber: Superiority Or Stuck In Legal Hurdles?, Jan Kallberg Feb 2013

Offensive Cyber: Superiority Or Stuck In Legal Hurdles?, Jan Kallberg

Jan Kallberg

In recent years, offensive cyber operations have attracted significant interest from the non-Defense Department academic legal community, prompting numerous articles seeking to create a legal theory for cyber conflicts. Naturally, cyber operations should be used in an ethical way, but the hurdles generated by the legal community are staggering. At a time when the United States has already lost an estimated $4 trillion in intellectual property as a result of foreign cyber espionage, not to mention the loss of military advantage, focusing on what the United States cannot do in cyberspace only hinders efforts to defend the country from future …


Europe In A ‘Nato Light’ World - Building Affordable And Credible Defense For The Eu, Jan Kallberg, Adam Lowther Jan 2013

Europe In A ‘Nato Light’ World - Building Affordable And Credible Defense For The Eu, Jan Kallberg, Adam Lowther

Jan Kallberg

From an outsider’s perspective, the Common Security and Defense Policy and the efforts of the European Defense Agency are insufficient to provide Europe with the defense it will require in coming decades. While the European Union—particularly the members of the European Monetary Union—struggle to solve prolonged fiscal challenges, viable European security alternatives to an American-dominated security architecture are conspicuously absent from the documents and discussions that are coming from the European Council and at a time when the United States is engaged in an Asia-Pacific pivot. This is not to say that no thought has been given to defense issues. …


Cyber Operations Bridging From Concept To Cyber Superiority, Jan Kallberg, Bhavani Thuraisingham Jan 2013

Cyber Operations Bridging From Concept To Cyber Superiority, Jan Kallberg, Bhavani Thuraisingham

Jan Kallberg

The United States is preparing for cyber conflicts and ushering in a new era for national security. The concept of cyber operations is rapidly developing, and the time has come to transpose the conceptual heights to a broad ability to fight a strategic cyber conflict and defend the Nation in a cohesive way. Richard M. George, a former National Security Agency official, commented on recent developments: “Other countries are preparing for a cyberwar. If we’re not pushing the envelope in cyber, somebody else will.”1 Therefore, increased budgets are allocated to cyber operations research and education. The Defense Advanced Research Projects …


A Social-Creative-Cognitive (Scc) Model For Requirements Engineering, Linda Dawson Dec 2012

A Social-Creative-Cognitive (Scc) Model For Requirements Engineering, Linda Dawson

Associate Professor Linda Dawson

This paper describes a research project and the findings from a set of six cases which examine professional requirements engineering (RE) practice from the perspective of how analysts reach agreement on system requirements for Information Systems Development (ISD). In these studies, it was found that the analysts reached agreement on requirements with clients through communication and negotiation based on both analysts’ cognitive skills in problem-solving and creative skills in developing informal models that could be used in the negotiation of agreement and sign-off on requirements specifications. A theoretical model of Social-Creative-Cognitive (SCC) aspects of Requirements Engineering is proposed encompassing the …


Ict For Poverty Alleviation In Pacific Island Nations: Study Of Icts4d In Fiji, Deogratias Harorimana, Opeti Rokotuinivono, Emali Sewale, Fane Salaiwai, Marica Naulu, Evangelin Roy Dec 2012

Ict For Poverty Alleviation In Pacific Island Nations: Study Of Icts4d In Fiji, Deogratias Harorimana, Opeti Rokotuinivono, Emali Sewale, Fane Salaiwai, Marica Naulu, Evangelin Roy

Dr Deogratias Harorimana

ICT for Poverty Alleviation in Pacific Island Nations: Study of ICTs4D in Fiji There has been a vague and little knowledge on the role or potential of Information and Communications Technologies (ICTs) in relation to addressing poverty in Fiji. This may be probably due to the newness of the technology in the South Pacific Region as a whole but also probably due to the fact that only 9.7% of the current Fiji 931,000 populations are internet users (ITC Figures 2011). This paper reports on finding how ICTs is contributing towards poverty alleviation in Fiji. On the basis of reviewed best …


Diseñando Colisiones De Satélites En La Guerra Cibernética Encubierta, Jan Kallberg Dec 2012

Diseñando Colisiones De Satélites En La Guerra Cibernética Encubierta, Jan Kallberg

Jan Kallberg

La guerra concentrada en la red depende de la red de información global para capacidades de combate conjuntas.3 La capa fundamental crea la capacidad de combate global como la columna vertebral espacial de la red de información donde los haberes espaciales son el elemento decisivo. EE.UU. depende de las capacidades espaciales para su éxito y la seguridad nacional de EE.UU. se basa hoy en día en un número limitado de satélites muy utilizados. Estos satélites son cruciales para la disuasión estratégica, la vigilancia, la recopilación de inteligencia y las comunicaciones militares. Si la disuasión estratégica falla, los satélites forman parte …


The Return Of Dr. Strangelove: How Austerity Makes Us Stop Worrying And Love The Bomb…And Cyber War, Jan Kallberg, Adam Lowther Nov 2012

The Return Of Dr. Strangelove: How Austerity Makes Us Stop Worrying And Love The Bomb…And Cyber War, Jan Kallberg, Adam Lowther

Jan Kallberg

With sequestration looming—generating significant cuts to defense spending—the United States may find itself increasingly relying on nuclear and cyber deterrence as an affordable way to guarantee national sovereignty and prevent major conflict. While earlier defense planning and acquisitions were based on economic conditions that no longer exist, Congress’ options to balance the budget by cutting defense spending are politically palatable because far fewer American are “defense voters” than “social welfare voters,” according to a number of recent public opinion surveys.


Analysis - Toward A New American Military., Adam Lowther, Jan Kallberg Oct 2012

Analysis - Toward A New American Military., Adam Lowther, Jan Kallberg

Jan Kallberg

In releasing the United States Department of Defense’s (DoD) Sustaining U.S. Global Leadership: Priorities for 21st Century Defense and Defense Budget Priorities and Choices in January 2012, President Barack Obama and Secretary of Defense Leon Panetta offered a rationale for the administration’s reductions in defense spending. By stating that the shift in strategic direction is an effort to “put our fiscal house in order” and a response to the 2011 Budget Control Act, which requires DoD to reduce spending by $487 billion between fiscal years 2012 and 2021, the United States’ NATO partners in Europe were given considerable reason for …


The Return Of Dr. Strangelove, Jan Kallberg, Adam Lowther Aug 2012

The Return Of Dr. Strangelove, Jan Kallberg, Adam Lowther

Jan Kallberg

With the prospect of sequestration looming, the United States may find itself increasingly rely ing on nuclear and cy ber deterrence as an affordable means of guaranteeing national sovereignty and preventing major conflict between the U.S. and potential adversaries in the Asia-Pacific. While earlier defense planning and acquisition were based on economic conditions that no longer ex ist, Congress’s options to balance the budget by cutting defense spending are politically palatable because far fewer American are “defense v oters” relative to “social welfare voters,” according to a number of recent public opinion surveys. The simple fact is China’s rise has …


Common Criteria Meets Realpolitik Trust, Alliances, And Potential Betrayal, Jan Kallberg Jul 2012

Common Criteria Meets Realpolitik Trust, Alliances, And Potential Betrayal, Jan Kallberg

Jan Kallberg

Common Criteria for Information Technology Security Evaluation has the ambition to be a global standard for IT-security certification. The issued certifications are mutually recognized between the signatories of the Common Criteria Recognition Arrangement. The key element in any form of mutual relationships is trust. A question raised in this paper is how far trust can be maintained in Common Criteria when additional signatories enter with conflicting geopolitical interests to earlier signatories. Other issues raised are control over production, the lack of permanent organization in the Common Criteria, which leads to concerns of being able to oversee the actual compliance. As …


Towards Cyber Operations The New Role Of Academic Cyber Security Research And Education, Jan Kallberg, Bhavani Thuraisingham Jun 2012

Towards Cyber Operations The New Role Of Academic Cyber Security Research And Education, Jan Kallberg, Bhavani Thuraisingham

Jan Kallberg

Abstract – The shift towards cyber operations represents a shift not only for the defense establishments worldwide but also cyber security research and education. Traditionally cyber security research and education has been founded on information assurance, expressed in underlying subfields such as forensics, network security, and penetration testing. Cyber security research and education is connected to the homeland security agencies and defense through funding, mutual interest in the outcome of the research, and the potential job market for graduates. The future of cyber security is both defensive information assurance measures and active defense driven information operations that jointly and coordinately …


Switching Costs And Loyalty: Understanding How Trust Moderates Online Consumers’ Ties To Merchants, Michelle Carter, Richard Klein, Jason B. Thatcher, Ryan Wright May 2012

Switching Costs And Loyalty: Understanding How Trust Moderates Online Consumers’ Ties To Merchants, Michelle Carter, Richard Klein, Jason B. Thatcher, Ryan Wright

Jason Bennett Thatcher

Information technology has transformed how travelers interact with travel service providers. Due to fierce competition in the online air travel industry, e-ticketing services have focused attention on fostering customer loyalty. This is an important strategy because, in general, initial transactions with new customers are less profitable than transactions with existing customers. Drawing on research on customer loyalty, switching costs, and trust, this study develops, and proposes an empirical test, for a model incorporating trust as a moderator of the relationship between switching costs and online customer loyalty. We propose that in the presence of high customer trust, e-businesses should have …


From Dog Licenses To Democracy: Local Government Approcahes To Eservice Delivery In Australia, Peter Shackleton, Julie Fisher, Linda Dawson Mar 2012

From Dog Licenses To Democracy: Local Government Approcahes To Eservice Delivery In Australia, Peter Shackleton, Julie Fisher, Linda Dawson

Associate Professor Linda Dawson

Municipal councils worldwide are recognizing the need and value of the Internet to deliver information and services. The move to e-Government in Australia and across the world has been prompted by factors such as government reform and the need to reduce cost, and to improve the efficiency and effectiveness of service delivery. Only recently, however, have there been more significant moves towards local e-Government in many countries. This research paper reports on the progress local governments in Victoria, Australia have made towards e-Government implementation. The paper provides a background to types of electronic information and services provided by local government …


Rqf Publication Quality Measures: Methodological Issues, John W. Lamp, Simon K. Milton, Linda Dawson, Julie Fisher Mar 2012

Rqf Publication Quality Measures: Methodological Issues, John W. Lamp, Simon K. Milton, Linda Dawson, Julie Fisher

Associate Professor Linda Dawson

The Research Quality Framework uses Thomson-ISI citation benchmarks as its main set of objective measures of research quality. The Thomson-ISI measures rely on identifying a core set of journals in which the major publications for a discipline are to be found. The core for a discipline is determined by applying a nontransparent process that is partly based on Bradford’s Law (1934). Yet Bradford was not seeking measures about quality of publications or journals. How valid then is it to base measures of publication quality on Bradford’s Law? We explore this by returning to Bradford’s Law and subsequent related research asking …


Understanding It Adoption And Consumption Within The Social Structure Of A Consumer’S Economy, Sherman Ting, Linda Dawson, Chris Dubelaar Mar 2012

Understanding It Adoption And Consumption Within The Social Structure Of A Consumer’S Economy, Sherman Ting, Linda Dawson, Chris Dubelaar

Associate Professor Linda Dawson

Research into adoption, acceptance and consumption of Information Technology (IT) within its diffusion cycle has been extensively studied in Information Systems (IS) and marketing. However, research often focused too narrowly on technology adoption rates and drivers leading to technology adoption and acceptance. This paper discusses how understanding the social structure of a consumer’s economy, a consumer’s portfolio of capital resources, can reveal the individual’s approach and experiences towards technology adoption and consumption present and future. It provides a novel multi-disciplinary and practical approach into understanding the technology consumer by looking at how economic, cultural, social, educational, technological and political capital …


Defining The Mobile Work Domain, Linda Dawson, Julie Fisher, Helana Scheepers Mar 2012

Defining The Mobile Work Domain, Linda Dawson, Julie Fisher, Helana Scheepers

Associate Professor Linda Dawson

There is increasing interest in the application of ubiquitous computing concepts to the use of mobile and wireless technologies in business. This paper presents the results of a conceptual study of the literature in ubiquitous and mobile computing and related areas. The outcome of the conceptual study is a context model of an identified Mobile Work Domain (MWD) which is focussed on mobile commerce and the use of new technologies and approaches to business processes in the workplace. This framework and context model comprises existing domains of activity and research, including electronic commerce, computer mediated communication and computer supported collaborative …


Does It Really Matter? First Impressions From A Company.S Web Site, Linda Dawson, Joze Kuzic Mar 2012

Does It Really Matter? First Impressions From A Company.S Web Site, Linda Dawson, Joze Kuzic

Associate Professor Linda Dawson

No abstract provided.


Modus Vivendi Of E-Business, Joze Kuzic, Julie Fisher, Angela Scollary, Linda Dawson, Milan Kuzic, Rod Turner Mar 2012

Modus Vivendi Of E-Business, Joze Kuzic, Julie Fisher, Angela Scollary, Linda Dawson, Milan Kuzic, Rod Turner

Associate Professor Linda Dawson

This paper reports on an investigation into relationships between challenges and success factors in e-business, from the perspective of the acknowledged benefits achieved by large organizations operating within the Australian context. To enable organisations to achieve benefits from e-business, it is imperative for companies to recognise challenges before them as well as to identify critical success factors necessary for their success. The outcome of the research reported in this paper is a key set of critical success factors, challenges and benefits that can be used as a modus vivendi to overcome problems by applying appropriate solutions in order to achieve …


Women In Ict: Guidelines For Evaluating Intervention Programmes, Annemieke Craig, Julie Fisher, Linda Dawson Mar 2012

Women In Ict: Guidelines For Evaluating Intervention Programmes, Annemieke Craig, Julie Fisher, Linda Dawson

Associate Professor Linda Dawson

Many intervention programmes to increase the number of women in theInformation and Communications Technology (ICT) profession have been implemented over the last twenty years. Detailed evaluations help us to determine the effectiveness of these programmes yet few comprehensive evaluations appear in the literature.The research reported here describes an investigation of the evaluation of the intervention programmes focusing on increasing the enrolment and retention of females in ICT in Australia. This paper describes an empirical study which explores how evaluation has been and might be conducted and concludes with guidelines for evaluation for those developing programmes for increasing the participation of …